Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

signin-oidc #15

Open
craigs100 opened this issue Sep 19, 2024 · 2 comments
Open

signin-oidc #15

craigs100 opened this issue Sep 19, 2024 · 2 comments

Comments

@craigs100
Copy link

craigs100 commented Sep 19, 2024

This package works great on it's own. Even when I've pulled the few files into my own project and used the same appsettings locally it works fine. However, it doesn't against the client's MS OIDC system. Looking into it I'm trying to understand why a redirect_uri of https://mydomain/signin-oidc is generated when there isn't such a page in the solution nor Umbraco. Running locally, it all just works, you see the page that was protected. Running live, I'm redirected to mysite/signin-oidc which we don't have of course and so get a 404.

Just looking for some insight really to help debug. It would appear the client's system isn't respecting the return url.

@biapar
Copy link

biapar commented Oct 24, 2024

The callback url is /umbraco/signin-oidc

@craigs100
Copy link
Author

craigs100 commented Oct 25, 2024

Turns out OAuth and OIDC are complicated beasts with several flavours of each. I eventually got it all working but required a lot of reading and viewing of tutorials, and that was just to work out what was at the client's end. No fault of the package, which was a great starting point. Once I knew what was actually at the client's end and slight adjustments made, it worked fine.
B2C Auth ain't for the faint-hearted! lol

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants